mmcpmerged 100628150159-phpapp01

27
Mobile Mayhem: Designing an E-Commerce Regime to Regulate Dangerous Behavior in Mobile Environments Professor Joshua Fairfield Associate Professor of Law, Washington and Lee University School of Law Director, Frances Lewis Law Center © 2010 Professor Robin Fretwell Wilson Washington and Lee University School of Law © 2010

Upload: fairfieldj

Post on 12-Nov-2014

294 views

Category:

Documents


0 download

DESCRIPTION

African Dialogue Rough Draft Slides--Child Protection and eCommerce

TRANSCRIPT

Page 1: Mmcpmerged 100628150159-phpapp01

Mobile Mayhem:Designing an E-Commerce Regime to Regulate Dangerous Behavior in

Mobile Environments

Professor Joshua Fairfield Associate Professor of Law, Washington and Lee University School of Law Director, Frances Lewis Law Center © 2010  

Professor Robin Fretwell WilsonWashington and Lee University School of Law

© 2010

Page 2: Mmcpmerged 100628150159-phpapp01

RoadMap

1. Mobile Mayhem: What Can the ‘Net Teach Us About the Future of Mobile Environments?

2. Failures of Real-World Enforcement Regimes in Novel Contexts

3. Incentives: Workable Alternatives to Enforcement

Page 3: Mmcpmerged 100628150159-phpapp01

Mobile Mayhem: Mutating Issues

Marginal Conduct Appeared on the Internet Immediately

“Measured in terms of depravity, insularity and traffic-driven turnover, the culture of /b/ has little precedent. /b/ reads like the inside of a high-school bathroom stall, or an obscene telephone party line, or a blog with no posts and all comments filled with slang that you are too old to understand.” –Matthias Schwartz, “The Trolls Among Us,” in The New York Times, 2008

Page 4: Mmcpmerged 100628150159-phpapp01

Mobile Mayhem: Mutating Issues• Virtual Worlds made

this Marginal Conduct • more graphic • more real, and • more accessible to Children

• Virtual Worlds Accept/Target Children via Gaming Model

• and provide parent-free venue for kids to bully/speak explicitly to each other

• Mobile Environments offer LESS supervision and GREATER variety

Page 5: Mmcpmerged 100628150159-phpapp01

Mobile Mayhem: Sex• Sexting: Early Indicator of

Marginal Conduct Moving from Desktop to Mobile

• Augmented Reality Objectification• “Jiggletits”: user takes pics

of women & manipulates their bodies

• “Bikini Camera”: user takes pics of clothed women and overlays bikini-clad women over them

• Pornographic MMS, Websites, Ads, & Apps

Page 6: Mmcpmerged 100628150159-phpapp01

Mobile Mayhem: Violence

• Augmented Reality

• Brings Violence Closer to Real Life

• Will get more gruesome (realistic) as devices progress

Page 7: Mmcpmerged 100628150159-phpapp01

Mobile Mayhem: Privacy & Anonymity

Geolocation Services

• Passive (unlike Desktop “cookies,” which operate on click)

• Constant (unlike cookies, which stop logging you when you log off)

• Necessary for the Commerce Services

Page 8: Mmcpmerged 100628150159-phpapp01

Mobile Mayhem: Privacy & Anonymity

Social Network Integration

• Real Life ID Connection

• Broadcasting Private Information

• Makes Users Easier to Contact in Real Life

Page 9: Mmcpmerged 100628150159-phpapp01

Imagine that instead of “Capt. Tim’s Galley,” this showed your presence at the local jail, or the

free clinic, or your child’s daycare facility.

Page 10: Mmcpmerged 100628150159-phpapp01

Mobile Commerce is now much more threatening to personal privacy than any

world government.

Page 11: Mmcpmerged 100628150159-phpapp01

Mobile Mayhem: Holistic Approach

Users Must Be Protected from Social AND

Economic Misconduct in Online Environments

Deceptive Advertising

Adult Content Accessible to

Children

Fraud/Scamming

Hate Speech, Cyber-Bullying,

Kid-to-Kid Explicit Chat

Invasions of Privacy

Technical Attack

Page 12: Mmcpmerged 100628150159-phpapp01

Mobile Mayhem: Scams & Fraud

USER-Focused

• SMShing

• VOIP phishing

• Fraudulent Apps or Websites

Mobile Devices offer more

varied means of contact,

increasing risk that user will be

unaware of threat and trust communication

too easily.

Page 13: Mmcpmerged 100628150159-phpapp01

Mobile Mayhem: Technical Attack

DEVICE-Focused

• Signal-borne• Wifi• Bluetooth• Email• Download• SMS/MMS

• Containment Problems• Mobility = Infection

Opportunity

• Hardware Theft• More Common than

Stationary Desktop Devices

Page 14: Mmcpmerged 100628150159-phpapp01

Mobile Microtransactions

Page 15: Mmcpmerged 100628150159-phpapp01

The U.S. system of

COLLECTIONSALE, and

RESALE

of personal information cannot be allowed to migrate to mobile

markets.

Page 16: Mmcpmerged 100628150159-phpapp01

Traditional Enforcement Regimes have been

Forced into Novel Environments

(the internet, virtual worlds, and now the mobile marketplace)

Page 17: Mmcpmerged 100628150159-phpapp01

Enforcement is Ineffective

Low Equipment

Cost +$1000s Profit

Through Comm. Fraud

Strong Incentive to

Defraud=

Strong Incentive to

Defraud+

Many Wrongdoers Engaging in

Fraud

Ineffectiveness of Even Harsh

Penalties=

Page 18: Mmcpmerged 100628150159-phpapp01

Failures of Enforcement Regimes

Email

• costs nothing to send• incentives strongly in favor of

abuse• CAN-SPAM act limits recovery

to ISPs, and has been nonexistent

Fax

• costs more to receive than to send

• TCPA enforcement destroyed legitimate business models

Text Messaging

• can cost to send or receive• abuse low where sending costly• enforcement has led mostly to

prosecuting children: punishing children for things they do offline anyway

Telephone

• do-not-call list: arguably best abuse prevention of all

• businesses know who they may/may not contact

• enforcement serves as backstop

Page 19: Mmcpmerged 100628150159-phpapp01

The Myth of the Tech-Savvy Third Grader:

She may know which buttons do what, but she does NOT know

how to keep herself [or her (parents’) money] safe.

Page 20: Mmcpmerged 100628150159-phpapp01

Make Abuses Less Profitable!

Fewer Users Falling For

Scams+

Fewer Devices Vulnerable to

Attack

Lower Profit Margins, and

Lower Incentive for

Abuse

=

Fewer Users Allowing Privacy

Invasions

+Competitive

Marketplace for Non-Invasive

Products

Lower Profit Margins, and

Lower Incentive for

Invasion

=

Page 21: Mmcpmerged 100628150159-phpapp01

Multi-Part User Authentication"Double Opt-In" Procedures Cross-Account & Cross-Device

Authentication

Cross-Device Password Protection

• DO NOT store multiple passwords on mobile phones

• Use DIFFERENT passwords for each device and account

Technological Authentication

• Apple’s new iPhone heart monitor patent• Pantech’s ten-digit speed dial

fingerprint reader

Page 22: Mmcpmerged 100628150159-phpapp01

Regulation of Private Money

• Real-world-backed currencies are problematic

• Online fiat currencies do well

Page 23: Mmcpmerged 100628150159-phpapp01

Educating Users about Dangers to Children

Page 24: Mmcpmerged 100628150159-phpapp01

Carrier and Industry Provided Programs

Page 25: Mmcpmerged 100628150159-phpapp01

Public (Gov’t) Provided Programs

Page 26: Mmcpmerged 100628150159-phpapp01

Other Accessible Info

Page 27: Mmcpmerged 100628150159-phpapp01

Mobile Mayhem:Designing an E-Commerce Regime to Regulate Dangerous Behavior in

Mobile Environments

Joshua Fairfield Associate Professor of Law, Washington and Lee University School of Law Director, Frances Lewis Law Center  

Professor Robin Fretwell WilsonWashington and Lee University School of Law

© 2010